Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 16 Oct 2017 20:56:03 +0200
From:      Franco Fichtner <franco@lastsummer.de>
To:        Cy Schubert <Cy.Schubert@komquats.com>
Cc:        "Rodney W. Grimes" <freebsd-rwg@pdx.rh.CN85.dnsmgr.net>, Kevin Oberman <rkoberman@gmail.com>, Adrian Chadd <adrian.chadd@gmail.com>, Lev Serebryakov <lev@freebsd.org>, blubee blubeeme <gurenchan@gmail.com>, Poul-Henning Kamp <phk@phk.freebsd.dk>, FreeBSD current <freebsd-current@freebsd.org>
Subject:   Re: cve-2017-13077 - WPA2 security vulni
Message-ID:  <4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB@lastsummer.de>
In-Reply-To: <20171016185014.94859750@spqr.komquats.com>
References:  <20171016185014.94859750@spqr.komquats.com>

next in thread | previous in thread | raw e-mail | index | archive | help


> On 16. Oct 2017, at 8:50 PM, Cy Schubert <Cy.Schubert@komquats.com> wrote:
> 
> Eight patches have been posted so, it should be easy to patch 2.5, MFC, and bring head up to 2.6 later. This should avoid the risk of possible regressions.

Nope, does not apply easily.  Refactoring changed contexts, function names
and variable usage logic between 2.5 and 2.6.


Cheers,
Franco


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4CF70CE3-AC4B-4AFE-BF14-C78C5310F2EB>